


default search action
CRITIS 2017: Lucca, Italy
- Gregorio D'Agostino, Antonio Scala:
Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10707, Springer 2018, ISBN 978-3-319-99842-8 - Zejun Yang, José R. Martí:
Resilience of Electrical Distribution Systems with Critical Load Prioritization. 1-12 - Laura Petersen, Laure Fallou, Elisabete Carreira
, Andrei Utkin:
Public Tolerance Levels of Transportation Resilience: A Focus on the Oresund Region Within the IMPROVER Project. 13-24 - Jingquan Xie, Betim Sojeva, Erich Rome, Daniel Lückerath
:
Towards a Common Vocabulary for Crisis Management Scenarios. 25-36 - Georgia Lykou, George Iakovakis, George Chronis, Dimitris Gritzalis:
Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning. 37-47 - Chih-Yuan Lin, Simin Nadjm-Tehrani, Mikael Asplund:
Timing-Based Anomaly Detection in SCADA Networks. 48-59 - Alberto Tofani, Gregorio D'Agostino, Antonio Di Pietro
, Giacomo Onori, Maurizio Pollino
, Silvio Alessandroni, Vittorio Rosato
:
Operational Resilience Metrics for a Complex Electrical Network. 60-71 - Steffen O. P. Blume, Giovanni Sansavini
:
The Influence of Load Characteristics on Early Warning Signs in Power Systems. 72-83 - Simeone Chianese
, Armando Di Nardo, Michele Di Natale, Carlo Giudicianni
, Dino Musmarra, Giovanni Francesco Santonastaso
:
DMA Optimal Layout for Protection of Water Distribution Networks from Malicious Attack. 84-96 - Anna Bozza
, Domenico Asprone
, Fulvio Parisi
, Gaetano Manfredi
:
Role of Urban Interactions and Damage in Seismic Resilience of Historical Centers. 97-106 - Nikolaos Alexopoulos, Emmanouil Vasilomanolakis
, Natália Réka Ivánkó, Max Mühlhäuser:
Towards Blockchain-Based Collaborative Intrusion Detection Systems. 107-118 - Juan E. Rubio, Rodrigo Roman, Javier López:
Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection. 119-130 - James G. Wright, Stephen D. Wolthusen:
De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol. 131-143 - Stefano Starita
, Annunziata Esposito Amideo
, Maria Paola Scaparra:
Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models. 144-155 - Michael J. Rausch, Ken Keefe, Brett Feddersen, William H. Sanders:
Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options. 156-167 - Alex Coletti
, Antonio De Nicola
, Giordano Vicoli
, Maria Luisa Villani
:
A Gamified Approach to Participatory Modelling of Water System Risks. 168-180 - Dominique Wassermann, Andrea Antenucci, Giovanni Sansavini
:
Managing Gas and Electric Power Network Dependencies to secure Energy Supply: Application to the UK System. 181-184 - Aljoscha Lautenbach, Magnus Almgren
, Tomas Olovsson:
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems. 185-193 - Mohamad Gharib
, Paolo Lollini
, Andrea Ceccarelli
, Andrea Bondavalli
:
Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach. 194-206 - Pol Van Aubel, Kostas Papagiannopoulos, Lukasz Chmielewski, Christian Doerr:
Side-Channel Based Intrusion Detection for Industrial Control Systems. 207-224 - Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens:
Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees. 225-228 - Federica Inderst, Gabriele Oliva, Stefano Panzieri, Federica Pascucci, Roberto Setola:
Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization. 229-240 - Yeop Chang, Seungoh Choi, Jeong-Han Yun, Sin-Kyu Kim:
One Step More: Automatic ICS Protocol Field Analysis. 241-252 - Vincenzo Fioriti, Ivan Roselli
, Angelo Tatì
, Roberto Romano
, Gerardo De Canio:
Motion Magnification for Urban Buildings. 253-260 - Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci
:
Reputation Systems to Mitigate DoS Attack in Vehicular Network. 261-265 - Paul Berthier, Corentin Bresteau, José M. Fernandez:
On the Security of Aircraft Communication Networks. 266-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.